ID OPENVAS:1361412562310871217 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2018-11-23T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for resteasy-base RHSA-2014:1011-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871217");
script_version("$Revision: 12497 $");
script_tag(name:"last_modification", value:"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $");
script_tag(name:"creation_date", value:"2014-08-06 12:05:23 +0200 (Wed, 06 Aug 2014)");
script_cve_id("CVE-2014-3490", "CVE-2012-0818");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("RedHat Update for resteasy-base RHSA-2014:1011-01");
script_tag(name:"affected", value:"resteasy-base on Red Hat Enterprise Linux Server (v. 7)");
script_tag(name:"insight", value:"RESTEasy contains a JBoss project that provides frameworks to help build
RESTful Web Services and RESTful Java applications. It is a fully certified
and portable implementation of the JAX-RS specification.
It was found that the fix for CVE-2012-0818 was incomplete: external
parameter entities were not disabled when the
resteasy.document.expand.entity.references parameter was set to false.
A remote attacker able to send XML requests to a RESTEasy endpoint could
use this flaw to read files accessible to the user running the application
server, and potentially perform other more advanced XXE attacks.
(CVE-2014-3490)
This issue was discovered by David Jorm of Red Hat Product Security.
All resteasy-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"RHSA", value:"2014:1011-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2014-August/msg00005.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'resteasy-base'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_7");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_7")
{
if ((res = isrpmvuln(pkg:"resteasy-base-atom-provider", rpm:"resteasy-base-atom-provider~2.3.5~3.el7_0", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"resteasy-base-jaxb-provider", rpm:"resteasy-base-jaxb-provider~2.3.5~3.el7_0", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"resteasy-base-jaxrs", rpm:"resteasy-base-jaxrs~2.3.5~3.el7_0", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"resteasy-base-jaxrs-api", rpm:"resteasy-base-jaxrs-api~2.3.5~3.el7_0", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"resteasy-base-jettison-provider", rpm:"resteasy-base-jettison-provider~2.3.5~3.el7_0", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310871217", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for resteasy-base RHSA-2014:1011-01", "description": "The remote host is missing an update for the ", "published": "2014-08-06T00:00:00", "modified": "2018-11-23T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871217", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["2014:1011-01", "https://www.redhat.com/archives/rhsa-announce/2014-August/msg00005.html"], "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "lastseen": "2019-05-29T18:37:32", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-3490", "CVE-2012-0818"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310869294", "OPENVAS:1361412562310123344", "OPENVAS:1361412562310882014"]}, {"type": "nessus", "idList": ["FEDORA_2014-16845.NASL", "REDHAT-RHSA-2014-1011.NASL", "REDHAT-RHSA-2012-0421.NASL", "REDHAT-RHSA-2013-1263.NASL", "ORACLELINUX_ELSA-2014-1011.NASL", "REDHAT-RHSA-2012-1059.NASL", "REDHAT-RHSA-2014-1040.NASL", "CENTOS_RHSA-2014-1011.NASL", "JUNIPER_SPACE_JSA10627.NASL"]}, {"type": "redhat", "idList": ["RHSA-2014:0372", "RHSA-2012:1058", "RHSA-2012:1059", "RHSA-2014:1040", "RHSA-2013:1263", "RHSA-2014:1298", "RHSA-2014:1011", "RHSA-2012:1056", "RHSA-2014:1904", "RHSA-2012:0421"]}, {"type": "centos", "idList": ["CESA-2014:1011"]}, {"type": "fedora", "idList": ["FEDORA:D75E16087AA0"]}, {"type": "oraclelinux", "idList": ["ELSA-2014-1011"]}, {"type": "oracle", "idList": ["ORACLE:CPUOCT2018", "ORACLE:CPUOCT2018-4428296"]}], "modified": "2019-05-29T18:37:32", "rev": 2}, "score": {"value": 6.2, "vector": "NONE", "modified": "2019-05-29T18:37:32", "rev": 2}, "vulnersScore": 6.2}, "pluginID": "1361412562310871217", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for resteasy-base RHSA-2014:1011-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871217\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-06 12:05:23 +0200 (Wed, 06 Aug 2014)\");\n script_cve_id(\"CVE-2014-3490\", \"CVE-2012-0818\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"RedHat Update for resteasy-base RHSA-2014:1011-01\");\n\n\n script_tag(name:\"affected\", value:\"resteasy-base on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"insight\", value:\"RESTEasy contains a JBoss project that provides frameworks to help build\nRESTful Web Services and RESTful Java applications. It is a fully certified\nand portable implementation of the JAX-RS specification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:1011-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-August/msg00005.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'resteasy-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-atom-provider\", rpm:\"resteasy-base-atom-provider~2.3.5~3.el7_0\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxb-provider\", rpm:\"resteasy-base-jaxb-provider~2.3.5~3.el7_0\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs\", rpm:\"resteasy-base-jaxrs~2.3.5~3.el7_0\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs-api\", rpm:\"resteasy-base-jaxrs-api~2.3.5~3.el7_0\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jettison-provider\", rpm:\"resteasy-base-jettison-provider~2.3.5~3.el7_0\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "naslFamily": "Red Hat Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:58:23", "description": "RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0818.\n<a href=\"http://cwe.mitre.org/data/definitions/611.html\" rel=\"nofollow\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>", "edition": 6, "cvss3": {}, "published": "2014-08-19T18:55:00", "title": "CVE-2014-3490", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3490"], "modified": "2019-03-21T14:22:00", "cpe": ["cpe:/a:redhat:jboss_enterprise_application_platform:6.3.0", "cpe:/a:redhat:resteasy:3.0", "cpe:/a:redhat:resteasy:2.3.7.2"], "id": "CVE-2014-3490", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3490", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:redhat:resteasy:3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:3.0:beta2:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:47:17", "description": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "edition": 5, "cvss3": {}, "published": "2012-11-23T20:55:00", "title": "CVE-2012-0818", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0818"], "modified": "2017-08-29T01:31:00", "cpe": ["cpe:/a:redhat:resteasy:1.1", "cpe:/a:redhat:resteasy:1.0.0", "cpe:/a:redhat:resteasy:2.2.3", "cpe:/a:redhat:resteasy:1.2", "cpe:/a:redhat:resteasy:2.2.2", "cpe:/a:redhat:resteasy:2.2.0", "cpe:/a:redhat:resteasy:2.3.0", "cpe:/a:redhat:resteasy:1.0.1", "cpe:/a:redhat:resteasy:2.0.0", "cpe:/a:redhat:resteasy:2.0.1", "cpe:/a:redhat:resteasy:2.1.0", "cpe:/a:redhat:resteasy:1.0.2", "cpe:/a:redhat:resteasy:2.2.1"], "id": "CVE-2012-0818", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0818", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*"]}], "redhat": [{"lastseen": "2019-08-13T18:45:50", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.3.0 on Red Hat\nEnterprise Linux 5, 6, and 7 are advised to upgrade to these updated\npackages. The JBoss server process must be restarted for the update to\ntake effect.\n", "modified": "2018-06-07T02:39:06", "published": "2014-08-11T04:00:00", "id": "RHSA-2014:1040", "href": "https://access.redhat.com/errata/RHSA-2014:1040", "type": "redhat", "title": "(RHSA-2014:1040) Moderate: Red Hat JBoss Enterprise Application Platform 6.3.0 security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:47:12", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "description": "RESTEasy contains a JBoss project that provides frameworks to help build\nRESTful Web Services and RESTful Java applications. It is a fully certified\nand portable implementation of the JAX-RS specification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\n", "modified": "2018-04-12T03:33:31", "published": "2014-08-06T04:00:00", "id": "RHSA-2014:1011", "href": "https://access.redhat.com/errata/RHSA-2014:1011", "type": "redhat", "title": "(RHSA-2014:1011) Moderate: resteasy-base security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:54", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0818"], "description": "Red Hat Storage Console (RHS-C) is a powerful and simple web based\nGraphical User Interface for managing a Red Hat Storage 2.1 environment.\nThis feature is provided as a Technology Preview, and is currently not\nsupported under Red Hat Storage subscription services. Refer to the\nfollowing for more information about Technology Previews:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Storage\nConsole REST API submitted a request containing an external XML entity\nto a RESTEasy endpoint, the entity would be resolved, allowing the\nattacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* A new server could not be added to a cluster if the required packages\nwere not installed on the server. Now, the administrator can add a server\nto a cluster which will automatically install the required packages, if\nmissing. (BZ#850431)\n\n* Previously, the rhs-log-collector tool did not collect GlusterFS related\nlogs. (BZ#855271)\n\n* Previously, it was not possible for rhsc-setup to complete successfully\non systems that have SELinux in disabled mode. (BZ#841342)\n\n* The 'Add Brick' button in the 'Add Bricks' pop up is now placed next to\nthe 'Brick Directory' field for a better UI experience. (BZ#863929)\n\n* The UUID of the volume was not visible. Now, a new field is added to the\n'Summary' sub-tab of the 'Volumes' tab to display the UUIDs. (BZ#887806)\n\n* The web console was not accessible after a server reboot. The setup\nmechanism has been modified to ensure the web console is accessible after a\nserver reboot. (BZ#838284)\n\nThis update also adds the following enhancements:\n\n* Previously, to import an existing storage cluster into the Red Hat\nStorage Console the hosts were added one by one. Now, a new feature has\nbeen added that allows users to import an existing storage cluster. The new\nCluster Creation window has an option to import an existing storage\ncluster. If IP_Address or the hostname and password of one of the hosts of\nthe cluster is entered, a list containing all the hosts of the cluster is\ndisplayed and the same can be added to the Console. The volumes which are\npart of the cluster also get imported. (BZ#850438)\n\n* The command line was required to enable a volume to use CIFS. Now, you\ncan enable or disable the export of a volume with the new 'CIFS' checkbox\nin the 'Create Volume' window. (BZ#850452)\n\n* The new Red Hat Support plug-in for Red Hat Storage is a Technology\nPreview feature that offers seamless, integrated access to the Red Hat\nsubscription services from the Red Hat Customer Portal. Subscribers who\ninstall this plug-in can access these features:\n\n- Create, manage, and update the Red Hat support cases.\n- Conveniently access exclusive Red Hat knowledge and solutions.\n- Search error codes, messages, etc. and view related knowledge from the\nRed Hat Customer Portal. (BZ#999245)\n\n* A new 'Event ID' column is added to the 'Events' table in the 'Advanced\nView' of 'Events' tab which allows users to see the ID of each event in the\n'Events' tab. (BZ#889942)\n\n* A new feature is added to manage and monitor the hooks on the Console. It\nalso reports changes in the hooks and checks for new hook scripts by\npolling at regular intervals. (BZ#850483)\n\n* A new 'Optimize for Virt Store' option is added to optimize a volume to\nuse it as a virt store. The system sets the \"virt\" group option on the\nvolume and also the following two volume options:\n\n- storage.owner-uid=36\n- storage.owner-gid=36\n\nThis option is available during volume creation and also for existing\nvolumes. (BZ#891493, BZ#891491)\n\nAll users of Red Hat Storage Server 2.1 are advised to upgrade to these\nupdated packages.\n", "modified": "2015-04-24T14:20:43", "published": "2013-09-16T04:00:00", "id": "RHSA-2013:1263", "href": "https://access.redhat.com/errata/RHSA-2013:1263", "type": "redhat", "title": "(RHSA-2013:1263) Moderate: Red Hat Storage Console 2.1 security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T14:34:10", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3490"], "description": "Red Hat JBoss Data Grid is a distributed in-memory data grid, based on\nInfinispan.\n\nThis release of Red Hat JBoss Data Grid 6.3.1 serves as a replacement for\nRed Hat JBoss Data Grid 6.3.0. It includes various bug fixes which are\ndetailed in the Red Hat JBoss Data Grid 6.3.1 Release Notes. The Release\nNotes are available at:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Data_Grid/\n\nThis update also fixes the following security issue:\n\nIt was found that the external parameter entities were not disabled when\nthe resteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThe CVE-2014-3490 issue was discovered by David Jorm of Red Hat Product\nSecurity.\n\nAll users of Red Hat JBoss Data Grid 6.3.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Data Grid 6.3.1.", "modified": "2019-02-20T17:17:59", "published": "2014-09-24T20:49:09", "id": "RHSA-2014:1298", "href": "https://access.redhat.com/errata/RHSA-2014:1298", "type": "redhat", "title": "(RHSA-2014:1298) Moderate: Red Hat JBoss Data Grid 6.3.1 update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T14:34:59", "bulletinFamily": "unix", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "description": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform's \"jboss-as/server/[PROFILE]/deploy/\" directory, along\nwith all other customized configuration files.\n\nAll users of JBoss Enterprise Application Platform 5.1.2 as provided from\nthe Red Hat Customer Portal are advised to install this update.", "modified": "2019-02-20T17:33:58", "published": "2012-07-05T23:17:51", "id": "RHSA-2012:1056", "href": "https://access.redhat.com/errata/RHSA-2012:1056", "type": "redhat", "title": "(RHSA-2012:1056) Moderate: resteasy security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-12-11T13:31:18", "bulletinFamily": "unix", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "description": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform's \"jboss-as/server/[PROFILE]/deploy/\" directory, along\nwith all other customized configuration files.\n\nUsers of JBoss Enterprise Application Platform 5.1.2 on Red Hat Enterprise\nLinux 4, 5, and 6 should upgrade to these updated packages, which correct\nthis issue. The JBoss server process must be restarted for this update to\ntake effect.\n", "modified": "2018-06-07T02:37:45", "published": "2012-07-05T04:00:00", "id": "RHSA-2012:1059", "href": "https://access.redhat.com/errata/RHSA-2012:1059", "type": "redhat", "title": "(RHSA-2012:1059) Moderate: resteasy security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-12-11T13:31:14", "bulletinFamily": "unix", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "description": "Red Hat Enterprise Virtualization Manager is a visual tool for centrally\nmanaging collections of virtual machines running Red Hat Enterprise Linux\nand Microsoft Windows. These packages also include the Red Hat Enterprise\nVirtualization Manager REST (Representational State Transfer) API, a set of\nscriptable commands that give administrators the ability to perform queries\nand operations on Red Hat Enterprise Virtualization Manager.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Enterprise\nVirtualization Manager REST API submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* Previously the REST API was ignoring the \"Accept\" header. This made it\nimpossible to retrieve detailed information about specific sub-collections,\nincluding hosts and disks. The REST API has been updated and now processes\nthe \"Accept\" header as originally intended. (BZ#771369)\n\n* The \"start_time\" Virtual Machine property was previously always set. This\nmeant that even Virtual Machines that were stopped, had a value for\n\"start_time\". An update has been made to ensure that the \"start_time\"\nproperty is only set when the Virtual Machine has been started, and is\nrunning. (BZ#772975)\n\n* The 'rhevm-setup' script previously only ran successfully on systems with\ntheir locale set to 'en_US.UTF-8', 'en_US.utf-8', or 'en_US.utf8'. The\nscript has since been updated to also run successfully in additional\nlocales, including 'ja_JP.UTF-8'. (BZ#784860)\n\n* The REST API did not previously validate that all required parameters\nwere provided when enabling power management. The response code returned\nwould also incorrectly indicate the operation had succeeded where\nmandatory parameters were not supplied. An update has been made to ensure\nthat the power management parameters are validated correctly. (BZ#785744)\n\n* Previously no warning or error was issued when the amount of free disk\nspace on a host was low. When no free disk space remained on the host it\nwould become non-responsive with no prior warning. An update has been made\nto report a warning in the audit log when a host's free disk space is less\nthan 1000 MB, and an error when a host's free disk space is less than 500\nMB. (BZ#786132)\n\n* When importing Virtual Machines no notification was provided if the MAC\naddress of the network interface card clashed with that of an existing\nVirtual Machine. Now when this occurs a message is printed to the audit\nlog, highlighting the need for manual intervention. (BZ#795416)\n\n* Previously it was not possible to set more, or less, than one value for\nSpiceSecureChannels using the rhevm-config tool. This meant it was not\npossible to encrypt all SPICE channels. The rhevm-config tool has been\nupdated and it is now possible to encrypt all SPICE channels, by adding\nthem to the SpiceSecureChannels configuration key. (BZ#784012)\n\nAll Red Hat Enterprise Virtualization users are advised to upgrade to these\nupdated packages, which address this vulnerability and fix these bugs.\nRefer to the Solution section for information about installing this update.\n", "modified": "2018-06-07T08:59:39", "published": "2012-03-26T04:00:00", "id": "RHSA-2012:0421", "href": "https://access.redhat.com/errata/RHSA-2012:0421", "type": "redhat", "title": "(RHSA-2012:0421) Moderate: rhevm security and bug fix update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-12-11T13:31:31", "bulletinFamily": "unix", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "description": "RESTEasy provides various frameworks to help you build RESTful web services\nand RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update adds\na new configuration option to disable entity expansion in RESTEasy. If\napplications on your server expose RESTEasy XML endpoints, a\nresteasy.document.expand.entity.references configuration snippet must be\nadded to their web.xml file to disable entity expansion in RESTEasy. Refer\nto Red Hat Bugzilla bug 785631 for details.\n\nWarning: Before applying this update, back up your JBoss Enterprise Web\nPlatform's \"jboss-as-web/server/[PROFILE]/deploy/\" directory and any other\ncustomized configuration files.\n\nUsers of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise Linux 4,\n5, and 6 should upgrade to these updated packages, which correct this\nissue. The JBoss server process must be restarted for this update to take\neffect.\n", "modified": "2018-06-07T02:39:14", "published": "2012-07-05T04:00:00", "id": "RHSA-2012:1058", "href": "https://access.redhat.com/errata/RHSA-2012:1058", "type": "redhat", "title": "(RHSA-2012:1058) Moderate: resteasy security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-12-11T13:32:27", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0818", "CVE-2012-5783", "CVE-2012-6153", "CVE-2013-2035", "CVE-2014-0059", "CVE-2014-0227", "CVE-2014-3481", "CVE-2014-3490", "CVE-2014-3577"], "description": "Red Hat JBoss Operations Network is a middleware management solution that\nprovides a single point of control to deploy, manage, and monitor JBoss\nEnterprise Middleware, applications, and services.\n\nThis JBoss Operations Network 3.3.0 release serves as a replacement for\nJBoss Operations Network 3.2.3, and includes several bug fixes. Refer to\nthe JBoss Operations Network 3.3.0 Release Notes for information on the\nmost significant of these changes. The Release Notes will be available\nshortly from https://access.redhat.com/documentation/en-US/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the fix for CVE-2012-5783 was incomplete: the code added\nto check that the server host name matches the domain name in a subject's\nCommon Name (CN) field in X.509 certificates was flawed. A\nman-in-the-middle attacker could use this flaw to spoof an SSL server\nusing a specially crafted X.509 certificate. (CVE-2012-6153, CVE-2014-3577)\n\nIt was found that the default context parameters as provided to RESTEasy\ndeployments by JBoss EAP did not explicitly disable external entity\nexpansion for RESTEasy. A remote attacker could use this flaw to perform\nXML External Entity (XXE) attacks on RESTEasy applications accepting XML\ninput. (CVE-2014-3481)\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThe HawtJNI Library class wrote native libraries to a predictable file name\nin /tmp when the native libraries were bundled in a JAR file, and no custom\nlibrary path was specified. A local attacker could overwrite these native\nlibraries with malicious versions during the window between when HawtJNI\nwrites them and when they are executed. (CVE-2013-2035)\n\nIt was found that the security auditing functionality provided by PicketBox\nand JBossSX, both security frameworks for Java applications, used a\nworld-readable audit.log file to record sensitive information. A local user\ncould possibly use this flaw to gain access to the sensitive information in\nthe audit.log file. (CVE-2014-0059)\n\nThe CVE-2013-2035 and CVE-2012-6153 issues were discovered by Florian\nWeimer of Red Hat Product Security. The CVE-2014-3481 issue was discovered\nby the Red Hat JBoss Enterprise Application Platform QE team. The\nCVE-2014-3490 issue was discovered by David Jorm of Red Hat Product\nSecurity.\n\nAll users of JBoss Operations Network 3.2.3 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Operations Network 3.3.0.", "modified": "2019-02-20T17:18:40", "published": "2014-11-25T21:45:01", "id": "RHSA-2014:1904", "href": "https://access.redhat.com/errata/RHSA-2014:1904", "type": "redhat", "title": "(RHSA-2014:1904) Important: Red Hat JBoss Operations Network 3.3.0 update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T14:35:48", "bulletinFamily": "unix", "cvelist": ["CVE-2011-5245", "CVE-2012-0818", "CVE-2013-1624", "CVE-2013-6468", "CVE-2013-7285", "CVE-2014-0002", "CVE-2014-0003"], "description": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.0.1 serves as a replacement for Red\nHat JBoss BRMS 6.0.0, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.0.1 Release Notes for information on the most\nsignificant of these changes. The Release Notes will be available shortly\nat https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/\n\nThe following security issues are fixed with this release:\n\nIt was discovered that JBoss BRMS allowed remote authenticated users to\nsubmit arbitrary Java code in MVFLEX Expression Language (MVEL) or JBoss\nRules expressions, resulting in arbitrary code execution within the\nsecurity context of the application server. Refer to the Solution section\nfor details on the fix for this issue. (CVE-2013-6468)\n\nIt was found that XStream could deserialize arbitrary user-supplied XML\ncontent, representing objects of any type. A remote attacker able to pass\nXML to XStream could use this flaw to perform a variety of attacks,\nincluding remote code execution in the context of the server running the\nXStream application. (CVE-2013-7285)\n\nIt was found that the Apache Camel XSLT component allowed XSL stylesheets\nto call external Java methods. A remote attacker able to submit messages to\na Camel route could use this flaw to perform arbitrary remote code\nexecution in the context of the Camel server process. (CVE-2014-0003)\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved, allowing\nthe attacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2011-5245, CVE-2012-0818)\n\nIt was discovered that bouncycastle leaked timing information when\ndecrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL server as a padding\noracle. (CVE-2013-1624)\n\nIt was found that the Apache Camel XSLT component would resolve entities in\nXML messages when transforming them using an XSLT route. A remote attacker\nable to submit messages to an XSLT Camel route could use this flaw to read\nfiles accessible to the user running the application server and,\npotentially, perform other more advanced XML External Entity (XXE) attacks.\n(CVE-2014-0002)\n\nThe CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of\nthe Red Hat Security Response Team, and the CVE-2013-6468 issue was\ndiscovered by Marc Schoenefeld of the Red Hat Security Response Team.\n\nRed Hat would like to thank Gr\u00e9gory Draperi for independently reporting\nCVE-2013-6468.\n\nAll users of Red Hat JBoss BRMS 6.0.0 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.0.1.", "modified": "2019-02-20T17:14:01", "published": "2014-04-04T01:26:33", "id": "RHSA-2014:0372", "href": "https://access.redhat.com/errata/RHSA-2014:0372", "type": "redhat", "title": "(RHSA-2014:0372) Important: Red Hat JBoss BRMS 6.0.1 update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:27:24", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1011\n\n\nRESTEasy contains a JBoss project that provides frameworks to help build\nRESTful Web Services and RESTful Java applications. It is a fully certified\nand portable implementation of the JAX-RS specification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-August/032507.html\n\n**Affected packages:**\nresteasy-base\nresteasy-base-atom-provider\nresteasy-base-jackson-provider\nresteasy-base-javadoc\nresteasy-base-jaxb-provider\nresteasy-base-jaxrs\nresteasy-base-jaxrs-all\nresteasy-base-jaxrs-api\nresteasy-base-jettison-provider\nresteasy-base-providers-pom\nresteasy-base-tjws\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1011.html", "edition": 3, "modified": "2014-08-06T14:38:38", "published": "2014-08-06T14:38:38", "href": "http://lists.centos.org/pipermail/centos-announce/2014-August/032507.html", "id": "CESA-2014:1011", "title": "resteasy security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:37:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-09-10T00:00:00", "id": "OPENVAS:1361412562310882014", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882014", "type": "openvas", "title": "CentOS Update for resteasy-base CESA-2014:1011 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for resteasy-base CESA-2014:1011 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882014\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-10 06:20:30 +0200 (Wed, 10 Sep 2014)\");\n script_cve_id(\"CVE-2014-3490\", \"CVE-2012-0818\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"CentOS Update for resteasy-base CESA-2014:1011 centos7\");\n script_tag(name:\"insight\", value:\"RESTEasy contains a JBoss project that\nprovides frameworks to help build RESTful Web Services and RESTful Java\napplications. It is a fully certified and portable implementation of the\nJAX-RS specification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint could\nuse this flaw to read files accessible to the user running the application\nserver, and potentially perform other more advanced XXE attacks.\n(CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\");\n script_tag(name:\"affected\", value:\"resteasy-base on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"CESA\", value:\"2014:1011\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-August/020469.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'resteasy-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"resteasy-base\", rpm:\"resteasy-base~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-atom-provider\", rpm:\"resteasy-base-atom-provider~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jackson-provider\", rpm:\"resteasy-base-jackson-provider~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-javadoc\", rpm:\"resteasy-base-javadoc~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxb-provider\", rpm:\"resteasy-base-jaxb-provider~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs\", rpm:\"resteasy-base-jaxrs~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs-all\", rpm:\"resteasy-base-jaxrs-all~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs-api\", rpm:\"resteasy-base-jaxrs-api~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-jettison-provider\", rpm:\"resteasy-base-jettison-provider~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-providers-pom\", rpm:\"resteasy-base-providers-pom~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"resteasy-base-tjws\", rpm:\"resteasy-base-tjws~2.3.5~3.el7_0\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3490"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-04-25T00:00:00", "id": "OPENVAS:1361412562310869294", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869294", "type": "openvas", "title": "Fedora Update for resteasy FEDORA-2014-16845", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for resteasy FEDORA-2014-16845\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869294\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-25 05:56:51 +0200 (Sat, 25 Apr 2015)\");\n script_cve_id(\"CVE-2014-3490\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for resteasy FEDORA-2014-16845\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'resteasy'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"resteasy on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2014-16845\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155942.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"resteasy\", rpm:\"resteasy~3.0.6~3.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3490"], "description": "Oracle Linux Local Security Checks ELSA-2014-1011", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123344", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123344", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-1011", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1011.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123344\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:32 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1011\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1011 - resteasy-base security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1011\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1011.html\");\n script_cve_id(\"CVE-2014-3490\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"resteasy-base\", rpm:\"resteasy-base~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-atom-provider\", rpm:\"resteasy-base-atom-provider~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jackson-provider\", rpm:\"resteasy-base-jackson-provider~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-javadoc\", rpm:\"resteasy-base-javadoc~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxb-provider\", rpm:\"resteasy-base-jaxb-provider~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs\", rpm:\"resteasy-base-jaxrs~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs-all\", rpm:\"resteasy-base-jaxrs-all~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jaxrs-api\", rpm:\"resteasy-base-jaxrs-api~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-jettison-provider\", rpm:\"resteasy-base-jettison-provider~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-providers-pom\", rpm:\"resteasy-base-providers-pom~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"resteasy-base-tjws\", rpm:\"resteasy-base-tjws~2.3.5~3.el7_0\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-17T13:14:52", "description": "Updated Red Hat JBoss Enterprise Application Platform 6.3.0 packages\nthat fix one security issue are now available for Red Hat Enterprise\nLinux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.3.0 on\nRed Hat Enterprise Linux 5, 6, and 7 are advised to upgrade to these\nupdated packages. The JBoss server process must be restarted for the\nupdate to take effect.", "edition": 26, "published": "2014-08-13T00:00:00", "title": "RHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:1040)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "modified": "2014-08-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:resteasy", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2014-1040.NASL", "href": "https://www.tenable.com/plugins/nessus/77178", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1040. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77178);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3490\");\n script_bugtraq_id(69058);\n script_xref(name:\"RHSA\", value:\"2014:1040\");\n\n script_name(english:\"RHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:1040)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated Red Hat JBoss Enterprise Application Platform 6.3.0 packages\nthat fix one security issue are now available for Red Hat Enterprise\nLinux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.3.0 on\nRed Hat Enterprise Linux 5, 6, and 7 are advised to upgrade to these\nupdated packages. The JBoss server process must be restarted for the\nupdate to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3490\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected resteasy package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x / 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1040\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL5\", rpm:\"jbossas-welcome-content-eap\") || rpm_exists(release:\"RHEL6\", rpm:\"jbossas-welcome-content-eap\") || rpm_exists(release:\"RHEL7\", rpm:\"jbossas-welcome-content-eap\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"JBoss EAP\");\n\n if (rpm_check(release:\"RHEL5\", reference:\"resteasy-2.3.8-5.SP1_redhat_1.1.ep6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"resteasy-2.3.8-5.SP1_redhat_1.1.ep6.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-2.3.8-5.SP1_redhat_1.1.ep6.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:29:40", "description": "Updated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.", "edition": 24, "published": "2014-08-07T00:00:00", "title": "CentOS 7 : resteasy-base (CESA-2014:1011)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "modified": "2014-08-07T00:00:00", "cpe": ["p-cpe:/a:centos:centos:resteasy-base-javadoc", "p-cpe:/a:centos:centos:resteasy-base-tjws", "p-cpe:/a:centos:centos:resteasy-base", "p-cpe:/a:centos:centos:resteasy-base-jaxrs-api", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:resteasy-base-jettison-provider", "p-cpe:/a:centos:centos:resteasy-base-jaxrs", "p-cpe:/a:centos:centos:resteasy-base-providers-pom", "p-cpe:/a:centos:centos:resteasy-base-jaxb-provider", "p-cpe:/a:centos:centos:resteasy-base-jaxrs-all", "p-cpe:/a:centos:centos:resteasy-base-atom-provider", "p-cpe:/a:centos:centos:resteasy-base-jackson-provider"], "id": "CENTOS_RHSA-2014-1011.NASL", "href": "https://www.tenable.com/plugins/nessus/77031", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1011 and \n# CentOS Errata and Security Advisory 2014:1011 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77031);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-3490\");\n script_bugtraq_id(69058);\n script_xref(name:\"RHSA\", value:\"2014:1011\");\n\n script_name(english:\"CentOS 7 : resteasy-base (CESA-2014:1011)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-August/020469.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3be1d342\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected resteasy-base packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-3490\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-atom-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jackson-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jaxb-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jaxrs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jaxrs-all\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jaxrs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-jettison-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-providers-pom\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:resteasy-base-tjws\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-atom-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jackson-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-javadoc-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxb-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-all-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-api-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-jettison-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-providers-pom-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"resteasy-base-tjws-2.3.5-3.el7_0\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy-base / resteasy-base-atom-provider / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:14:49", "description": "Updated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.", "edition": 25, "published": "2014-08-06T00:00:00", "title": "RHEL 7 : resteasy-base (RHSA-2014:1011)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "modified": "2014-08-06T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxb-provider", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-providers-pom", "cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-jettison-provider", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-jackson-provider", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs-api", "cpe:/o:redhat:enterprise_linux:7.5", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-atom-provider", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-tjws", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs-all", "cpe:/o:redhat:enterprise_linux:7.3", "p-cpe:/a:redhat:enterprise_linux:resteasy-base", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-javadoc", "p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs", "cpe:/o:redhat:enterprise_linux:7.6"], "id": "REDHAT-RHSA-2014-1011.NASL", "href": "https://www.tenable.com/plugins/nessus/77014", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1011. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77014);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3490\");\n script_bugtraq_id(69058);\n script_xref(name:\"RHSA\", value:\"2014:1011\");\n\n script_name(english:\"RHEL 7 : resteasy-base (RHSA-2014:1011)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3490\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-atom-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jackson-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxb-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs-all\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jaxrs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-jettison-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-providers-pom\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-base-tjws\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1011\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-atom-provider-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jackson-provider-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-javadoc-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jaxb-provider-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jaxrs-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jaxrs-all-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jaxrs-api-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-jettison-provider-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-providers-pom-2.3.5-3.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"resteasy-base-tjws-2.3.5-3.el7_0\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy-base / resteasy-base-atom-provider / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T12:49:07", "description": "From Red Hat Security Advisory 2014:1011 :\n\nUpdated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.", "edition": 21, "published": "2014-08-06T00:00:00", "title": "Oracle Linux 7 : resteasy-base (ELSA-2014-1011)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818", "CVE-2014-3490"], "modified": "2014-08-06T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:resteasy-base-jaxrs-all", "p-cpe:/a:oracle:linux:resteasy-base-jaxrs-api", "p-cpe:/a:oracle:linux:resteasy-base-javadoc", "p-cpe:/a:oracle:linux:resteasy-base-jackson-provider", "p-cpe:/a:oracle:linux:resteasy-base-tjws", "p-cpe:/a:oracle:linux:resteasy-base-jaxb-provider", "p-cpe:/a:oracle:linux:resteasy-base-providers-pom", "p-cpe:/a:oracle:linux:resteasy-base", "p-cpe:/a:oracle:linux:resteasy-base-jaxrs", "p-cpe:/a:oracle:linux:resteasy-base-atom-provider", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:resteasy-base-jettison-provider"], "id": "ORACLELINUX_ELSA-2014-1011.NASL", "href": "https://www.tenable.com/plugins/nessus/77011", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1011 and \n# Oracle Linux Security Advisory ELSA-2014-1011 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77011);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3490\");\n script_bugtraq_id(69058);\n script_xref(name:\"RHSA\", value:\"2014:1011\");\n\n script_name(english:\"Oracle Linux 7 : resteasy-base (ELSA-2014-1011)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:1011 :\n\nUpdated resteasy-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nModerate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy contains a JBoss project that provides frameworks to help\nbuild RESTful Web Services and RESTful Java applications. It is a\nfully certified and portable implementation of the JAX-RS\nspecification.\n\nIt was found that the fix for CVE-2012-0818 was incomplete: external\nparameter entities were not disabled when the\nresteasy.document.expand.entity.references parameter was set to false.\nA remote attacker able to send XML requests to a RESTEasy endpoint\ncould use this flaw to read files accessible to the user running the\napplication server, and potentially perform other more advanced XXE\nattacks. (CVE-2014-3490)\n\nThis issue was discovered by David Jorm of Red Hat Product Security.\n\nAll resteasy-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-August/004332.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected resteasy-base packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-atom-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jackson-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jaxb-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jaxrs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jaxrs-all\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jaxrs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-jettison-provider\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-providers-pom\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:resteasy-base-tjws\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-atom-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jackson-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-javadoc-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxb-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-all-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jaxrs-api-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-jettison-provider-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-providers-pom-2.3.5-3.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"resteasy-base-tjws-2.3.5-3.el7_0\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy-base / resteasy-base-atom-provider / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:13:02", "description": "Updated Red Hat Storage Console packages that fix one security issue,\nvarious bugs, and add enhancements are now available for Red Hat\nStorage Server 2.1.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRed Hat Storage Console (RHS-C) is a powerful and simple web based\nGraphical User Interface for managing a Red Hat Storage 2.1\nenvironment. This feature is provided as a Technology Preview, and is\ncurrently not supported under Red Hat Storage subscription services.\nRefer to the following for more information about Technology Previews:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat\nStorage Console REST API submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved,\nallowing the attacker to read files accessible to the user running the\napplication server. This flaw affected DOM (Document Object Model)\nDocument and JAXB (Java Architecture for XML Binding) input.\n(CVE-2012-0818)\n\nThis update also fixes the following bugs :\n\n* A new server could not be added to a cluster if the required\npackages were not installed on the server. Now, the administrator can\nadd a server to a cluster which will automatically install the\nrequired packages, if missing. (BZ#850431)\n\n* Previously, the rhs-log-collector tool did not collect GlusterFS\nrelated logs. (BZ#855271)\n\n* Previously, it was not possible for rhsc-setup to complete\nsuccessfully on systems that have SELinux in disabled mode.\n(BZ#841342)\n\n* The 'Add Brick' button in the 'Add Bricks' pop up is now placed next\nto the 'Brick Directory' field for a better UI experience. (BZ#863929)\n\n* The UUID of the volume was not visible. Now, a new field is added to\nthe 'Summary' sub-tab of the 'Volumes' tab to display the UUIDs.\n(BZ#887806)\n\n* The web console was not accessible after a server reboot. The setup\nmechanism has been modified to ensure the web console is accessible\nafter a server reboot. (BZ#838284)\n\nThis update also adds the following enhancements :\n\n* Previously, to import an existing storage cluster into the Red Hat\nStorage Console the hosts were added one by one. Now, a new feature\nhas been added that allows users to import an existing storage\ncluster. The new Cluster Creation window has an option to import an\nexisting storage cluster. If IP_Address or the hostname and password\nof one of the hosts of the cluster is entered, a list containing all\nthe hosts of the cluster is displayed and the same can be added to the\nConsole. The volumes which are part of the cluster also get imported.\n(BZ#850438)\n\n* The command line was required to enable a volume to use CIFS. Now,\nyou can enable or disable the export of a volume with the new 'CIFS'\ncheckbox in the 'Create Volume' window. (BZ#850452)\n\n* The new Red Hat Support plug-in for Red Hat Storage is a Technology\nPreview feature that offers seamless, integrated access to the Red Hat\nsubscription services from the Red Hat Customer Portal. Subscribers\nwho install this plug-in can access these features :\n\n* Create, manage, and update the Red Hat support cases.\n\n* Conveniently access exclusive Red Hat knowledge and solutions.\n\n* Search error codes, messages, etc. and view related knowledge from\nthe Red Hat Customer Portal. (BZ#999245)\n\n* A new 'Event ID' column is added to the 'Events' table in the\n'Advanced View' of 'Events' tab which allows users to see the ID of\neach event in the 'Events' tab. (BZ#889942)\n\n* A new feature is added to manage and monitor the hooks on the\nConsole. It also reports changes in the hooks and checks for new hook\nscripts by polling at regular intervals. (BZ#850483)\n\n* A new 'Optimize for Virt Store' option is added to optimize a volume\nto use it as a virt store. The system sets the 'virt' group option on\nthe volume and also the following two volume options :\n\n* storage.owner-uid=36\n\n* storage.owner-gid=36\n\nThis option is available during volume creation and also for existing\nvolumes. (BZ#891493, BZ#891491)\n\nAll users of Red Hat Storage Server 2.1 are advised to upgrade to\nthese updated packages.", "edition": 24, "published": "2014-11-17T00:00:00", "title": "RHEL 6 : Storage Server (RHSA-2013:1263)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0818"], "modified": "2014-11-17T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rhsc-restapi", "p-cpe:/a:redhat:enterprise_linux:redhat-access-plugin-storage", "p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy-java", "p-cpe:/a:redhat:enterprise_linux:rhsc-log-collector", "p-cpe:/a:redhat:enterprise_linux:otopi-java", "p-cpe:/a:redhat:enterprise_linux:python-lockfile", "p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy", "p-cpe:/a:redhat:enterprise_linux:otopi", "p-cpe:/a:redhat:enterprise_linux:otopi-repolib", "p-cpe:/a:redhat:enterprise_linux:rhsc-cli", "p-cpe:/a:redhat:enterprise_linux:python-kitchen", "p-cpe:/a:redhat:enterprise_linux:python-daemon", "p-cpe:/a:redhat:enterprise_linux:rhsc-tools", "p-cpe:/a:redhat:enterprise_linux:otopi-devel", "p-cpe:/a:redhat:enterprise_linux:rhsc-setup", "p-cpe:/a:redhat:enterprise_linux:rhsc-webadmin-portal", "p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy-repolib", "p-cpe:/a:redhat:enterprise_linux:rhsc-backend", "p-cpe:/a:redhat:enterprise_linux:python-ply", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:rhsc-sdk", "p-cpe:/a:redhat:enterprise_linux:rhsc-dbscripts", "p-cpe:/a:redhat:enterprise_linux:rhsc"], "id": "REDHAT-RHSA-2013-1263.NASL", "href": "https://www.tenable.com/plugins/nessus/79289", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1263. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79289);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-0818\");\n script_xref(name:\"RHSA\", value:\"2013:1263\");\n\n script_name(english:\"RHEL 6 : Storage Server (RHSA-2013:1263)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated Red Hat Storage Console packages that fix one security issue,\nvarious bugs, and add enhancements are now available for Red Hat\nStorage Server 2.1.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRed Hat Storage Console (RHS-C) is a powerful and simple web based\nGraphical User Interface for managing a Red Hat Storage 2.1\nenvironment. This feature is provided as a Technology Preview, and is\ncurrently not supported under Red Hat Storage subscription services.\nRefer to the following for more information about Technology Previews:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat\nStorage Console REST API submitted a request containing an external\nXML entity to a RESTEasy endpoint, the entity would be resolved,\nallowing the attacker to read files accessible to the user running the\napplication server. This flaw affected DOM (Document Object Model)\nDocument and JAXB (Java Architecture for XML Binding) input.\n(CVE-2012-0818)\n\nThis update also fixes the following bugs :\n\n* A new server could not be added to a cluster if the required\npackages were not installed on the server. Now, the administrator can\nadd a server to a cluster which will automatically install the\nrequired packages, if missing. (BZ#850431)\n\n* Previously, the rhs-log-collector tool did not collect GlusterFS\nrelated logs. (BZ#855271)\n\n* Previously, it was not possible for rhsc-setup to complete\nsuccessfully on systems that have SELinux in disabled mode.\n(BZ#841342)\n\n* The 'Add Brick' button in the 'Add Bricks' pop up is now placed next\nto the 'Brick Directory' field for a better UI experience. (BZ#863929)\n\n* The UUID of the volume was not visible. Now, a new field is added to\nthe 'Summary' sub-tab of the 'Volumes' tab to display the UUIDs.\n(BZ#887806)\n\n* The web console was not accessible after a server reboot. The setup\nmechanism has been modified to ensure the web console is accessible\nafter a server reboot. (BZ#838284)\n\nThis update also adds the following enhancements :\n\n* Previously, to import an existing storage cluster into the Red Hat\nStorage Console the hosts were added one by one. Now, a new feature\nhas been added that allows users to import an existing storage\ncluster. The new Cluster Creation window has an option to import an\nexisting storage cluster. If IP_Address or the hostname and password\nof one of the hosts of the cluster is entered, a list containing all\nthe hosts of the cluster is displayed and the same can be added to the\nConsole. The volumes which are part of the cluster also get imported.\n(BZ#850438)\n\n* The command line was required to enable a volume to use CIFS. Now,\nyou can enable or disable the export of a volume with the new 'CIFS'\ncheckbox in the 'Create Volume' window. (BZ#850452)\n\n* The new Red Hat Support plug-in for Red Hat Storage is a Technology\nPreview feature that offers seamless, integrated access to the Red Hat\nsubscription services from the Red Hat Customer Portal. Subscribers\nwho install this plug-in can access these features :\n\n* Create, manage, and update the Red Hat support cases.\n\n* Conveniently access exclusive Red Hat knowledge and solutions.\n\n* Search error codes, messages, etc. and view related knowledge from\nthe Red Hat Customer Portal. (BZ#999245)\n\n* A new 'Event ID' column is added to the 'Events' table in the\n'Advanced View' of 'Events' tab which allows users to see the ID of\neach event in the 'Events' tab. (BZ#889942)\n\n* A new feature is added to manage and monitor the hooks on the\nConsole. It also reports changes in the hooks and checks for new hook\nscripts by polling at regular intervals. (BZ#850483)\n\n* A new 'Optimize for Virt Store' option is added to optimize a volume\nto use it as a virt store. The system sets the 'virt' group option on\nthe volume and also the following two volume options :\n\n* storage.owner-uid=36\n\n* storage.owner-gid=36\n\nThis option is available during volume creation and also for existing\nvolumes. (BZ#891493, BZ#891491)\n\nAll users of Red Hat Storage Server 2.1 are advised to upgrade to\nthese updated packages.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/support/offerings/techpreview/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:1263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-0818\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:otopi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:otopi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:otopi-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:otopi-repolib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ovirt-host-deploy-repolib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-kitchen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-lockfile\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-ply\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-access-plugin-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-dbscripts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-log-collector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-restapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-setup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhsc-webadmin-portal\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:1263\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL6\", rpm:\"redhat-storage-server\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Storage Server\");\n\n if (rpm_check(release:\"RHEL6\", reference:\"otopi-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"otopi-devel-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"otopi-java-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"otopi-repolib-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"ovirt-host-deploy-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"ovirt-host-deploy-java-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"ovirt-host-deploy-repolib-1.1.0-1.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"python-daemon-1.5.2-1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"python-kitchen-1.1.1-2.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"python-lockfile-0.8-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"python-ply-3.3-7.el6ev\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"redhat-access-plugin-storage-2.1.0-0.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-backend-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-cli-2.1.0.0-0.bb3a.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-dbscripts-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-log-collector-2.1-0.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-restapi-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-sdk-2.1.0.0-0.bb3a.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-setup-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-tools-2.1.0-0.bb10.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"rhsc-webadmin-portal-2.1.0-0.bb10.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"otopi / otopi-devel / otopi-java / otopi-repolib / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-12T10:12:23", "description": "Security fix for CVE-2014-3490\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2015-04-27T00:00:00", "title": "Fedora 20 : resteasy-3.0.6-3.fc20 (2014-16845)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3490"], "modified": "2015-04-27T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:resteasy"], "id": "FEDORA_2014-16845.NASL", "href": "https://www.tenable.com/plugins/nessus/83066", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-16845.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83066);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-3490\");\n script_xref(name:\"FEDORA\", value:\"2014-16845\");\n\n script_name(english:\"Fedora 20 : resteasy-3.0.6-3.fc20 (2014-16845)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fix for CVE-2014-3490\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1107901\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155942.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4b80cdee\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected resteasy package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:resteasy\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"resteasy-3.0.6-3.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:10:35", "description": "Updated rhevm packages that fix one security issue and various bugs\nare now available.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRed Hat Enterprise Virtualization Manager is a visual tool for\ncentrally managing collections of virtual machines running Red Hat\nEnterprise Linux and Microsoft Windows. These packages also include\nthe Red Hat Enterprise Virtualization Manager REST (Representational\nState Transfer) API, a set of scriptable commands that give\nadministrators the ability to perform queries and operations on Red\nHat Enterprise Virtualization Manager.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat\nEnterprise Virtualization Manager REST API submitted a request\ncontaining an external XML entity to a RESTEasy endpoint, the entity\nwould be resolved, allowing the attacker to read files accessible to\nthe user running the application server. This flaw affected DOM\n(Document Object Model) Document and JAXB (Java Architecture for XML\nBinding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs :\n\n* Previously the REST API was ignoring the 'Accept' header. This made\nit impossible to retrieve detailed information about specific\nsub-collections, including hosts and disks. The REST API has been\nupdated and now processes the 'Accept' header as originally intended.\n(BZ#771369)\n\n* The 'start_time' Virtual Machine property was previously always set.\nThis meant that even Virtual Machines that were stopped, had a value\nfor 'start_time'. An update has been made to ensure that the\n'start_time' property is only set when the Virtual Machine has been\nstarted, and is running. (BZ#772975)\n\n* The 'rhevm-setup' script previously only ran successfully on systems\nwith their locale set to 'en_US.UTF-8', 'en_US.utf-8', or\n'en_US.utf8'. The script has since been updated to also run\nsuccessfully in additional locales, including 'ja_JP.UTF-8'.\n(BZ#784860)\n\n* The REST API did not previously validate that all required\nparameters were provided when enabling power management. The response\ncode returned would also incorrectly indicate the operation had\nsucceeded where mandatory parameters were not supplied. An update has\nbeen made to ensure that the power management parameters are validated\ncorrectly. (BZ#785744)\n\n* Previously no warning or error was issued when the amount of free\ndisk space on a host was low. When no free disk space remained on the\nhost it would become non-responsive with no prior warning. An update\nhas been made to report a warning in the audit log when a host's free\ndisk space is less than 1000 MB, and an error when a host's free disk\nspace is less than 500 MB. (BZ#786132)\n\n* When importing Virtual Machines no notification was provided if the\nMAC address of the network interface card clashed with that of an\nexisting Virtual Machine. Now when this occurs a message is printed to\nthe audit log, highlighting the need for manual intervention.\n(BZ#795416)\n\n* Previously it was not possible to set more, or less, than one value\nfor SpiceSecureChannels using the rhevm-config tool. This meant it was\nnot possible to encrypt all SPICE channels. The rhevm-config tool has\nbeen updated and it is now possible to encrypt all SPICE channels, by\nadding them to the SpiceSecureChannels configuration key. (BZ#784012)\n\nAll Red Hat Enterprise Virtualization users are advised to upgrade to\nthese updated packages, which address this vulnerability and fix these\nbugs. Refer to the Solution section for information about installing\nthis update.", "edition": 21, "published": "2014-11-17T00:00:00", "title": "RHEL 6 : rhevm (RHSA-2012:0421)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "modified": "2014-11-17T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rhevm-restapi", "p-cpe:/a:redhat:enterprise_linux:rhevm-userportal", "p-cpe:/a:redhat:enterprise_linux:rhevm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:rhevm-dbscripts", "p-cpe:/a:redhat:enterprise_linux:rhevm-notification-service", "p-cpe:/a:redhat:enterprise_linux:rhevm-jboss-deps", "p-cpe:/a:redhat:enterprise_linux:rhevm-iso-uploader", "p-cpe:/a:redhat:enterprise_linux:rhevm-genericapi", "p-cpe:/a:redhat:enterprise_linux:rhevm-webadmin-portal", "p-cpe:/a:redhat:enterprise_linux:rhevm-setup", "p-cpe:/a:redhat:enterprise_linux:rhevm", "p-cpe:/a:redhat:enterprise_linux:rhevm-backend", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:rhevm-log-collector", "p-cpe:/a:redhat:enterprise_linux:rhevm-config", "p-cpe:/a:redhat:enterprise_linux:rhevm-tools-common"], "id": "REDHAT-RHSA-2012-0421.NASL", "href": "https://www.tenable.com/plugins/nessus/79284", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0421. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79284);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-5245\", \"CVE-2012-0818\");\n script_bugtraq_id(51748, 51766);\n script_xref(name:\"RHSA\", value:\"2012:0421\");\n\n script_name(english:\"RHEL 6 : rhevm (RHSA-2012:0421)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated rhevm packages that fix one security issue and various bugs\nare now available.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRed Hat Enterprise Virtualization Manager is a visual tool for\ncentrally managing collections of virtual machines running Red Hat\nEnterprise Linux and Microsoft Windows. These packages also include\nthe Red Hat Enterprise Virtualization Manager REST (Representational\nState Transfer) API, a set of scriptable commands that give\nadministrators the ability to perform queries and operations on Red\nHat Enterprise Virtualization Manager.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat\nEnterprise Virtualization Manager REST API submitted a request\ncontaining an external XML entity to a RESTEasy endpoint, the entity\nwould be resolved, allowing the attacker to read files accessible to\nthe user running the application server. This flaw affected DOM\n(Document Object Model) Document and JAXB (Java Architecture for XML\nBinding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs :\n\n* Previously the REST API was ignoring the 'Accept' header. This made\nit impossible to retrieve detailed information about specific\nsub-collections, including hosts and disks. The REST API has been\nupdated and now processes the 'Accept' header as originally intended.\n(BZ#771369)\n\n* The 'start_time' Virtual Machine property was previously always set.\nThis meant that even Virtual Machines that were stopped, had a value\nfor 'start_time'. An update has been made to ensure that the\n'start_time' property is only set when the Virtual Machine has been\nstarted, and is running. (BZ#772975)\n\n* The 'rhevm-setup' script previously only ran successfully on systems\nwith their locale set to 'en_US.UTF-8', 'en_US.utf-8', or\n'en_US.utf8'. The script has since been updated to also run\nsuccessfully in additional locales, including 'ja_JP.UTF-8'.\n(BZ#784860)\n\n* The REST API did not previously validate that all required\nparameters were provided when enabling power management. The response\ncode returned would also incorrectly indicate the operation had\nsucceeded where mandatory parameters were not supplied. An update has\nbeen made to ensure that the power management parameters are validated\ncorrectly. (BZ#785744)\n\n* Previously no warning or error was issued when the amount of free\ndisk space on a host was low. When no free disk space remained on the\nhost it would become non-responsive with no prior warning. An update\nhas been made to report a warning in the audit log when a host's free\ndisk space is less than 1000 MB, and an error when a host's free disk\nspace is less than 500 MB. (BZ#786132)\n\n* When importing Virtual Machines no notification was provided if the\nMAC address of the network interface card clashed with that of an\nexisting Virtual Machine. Now when this occurs a message is printed to\nthe audit log, highlighting the need for manual intervention.\n(BZ#795416)\n\n* Previously it was not possible to set more, or less, than one value\nfor SpiceSecureChannels using the rhevm-config tool. This meant it was\nnot possible to encrypt all SPICE channels. The rhevm-config tool has\nbeen updated and it is now possible to encrypt all SPICE channels, by\nadding them to the SpiceSecureChannels configuration key. (BZ#784012)\n\nAll Red Hat Enterprise Virtualization users are advised to upgrade to\nthese updated packages, which address this vulnerability and fix these\nbugs. Refer to the Solution section for information about installing\nthis update.\"\n );\n # http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e4ac23ee\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:0421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-0818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-5245\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:U/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-dbscripts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-genericapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-iso-uploader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-jboss-deps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-log-collector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-notification-service\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-restapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-setup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-tools-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-userportal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhevm-webadmin-portal\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:0421\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_exists(rpm:\"rhevm-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-backend-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-backend-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-config-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-config-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-dbscripts-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-dbscripts-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-debuginfo-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-debuginfo-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-genericapi-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-genericapi-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-iso-uploader-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-iso-uploader-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-jboss-deps-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-jboss-deps-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-log-collector-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-log-collector-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-notification-service-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-notification-service-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-restapi-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-restapi-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-setup-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-setup-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-tools-common-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-tools-common-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-userportal-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-userportal-3.0.3_0001-3.el6\")) flag++;\n if (rpm_exists(rpm:\"rhevm-webadmin-portal-3.0.\", release:\"RHEL6\") && rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"rhevm-webadmin-portal-3.0.3_0001-3.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rhevm / rhevm-backend / rhevm-config / rhevm-dbscripts / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T13:10:58", "description": "Updated resteasy packages that fix one security issue are now\navailable for JBoss Enterprise Application Platform 5.1.2 for Red Hat\nEnterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy provides various frameworks to help you build RESTful web\nservices and RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an\nexternal XML entity to a RESTEasy endpoint, the entity would be\nresolved, allowing the attacker to read files accessible to the user\nrunning the application server. This flaw affected DOM (Document\nObject Model) Document and JAXB (Java Architecture for XML Binding)\ninput. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update\nadds a new configuration option to disable entity expansion in\nRESTEasy. If applications on your server expose RESTEasy XML\nendpoints, a resteasy.document.expand.entity.references configuration\nsnippet must be added to their web.xml file to disable entity\nexpansion in RESTEasy. Refer to Red Hat Bugzilla bug 785631 for\ndetails.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform's 'jboss-as/server/[PROFILE]/deploy/' directory,\nalong with all other customized configuration files.\n\nUsers of JBoss Enterprise Application Platform 5.1.2 on Red Hat\nEnterprise Linux 4, 5, and 6 should upgrade to these updated packages,\nwhich correct this issue. The JBoss server process must be restarted\nfor this update to take effect.", "edition": 27, "published": "2013-01-24T00:00:00", "title": "RHEL 5 / 6 : resteasy (RHSA-2012:1059)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-5245", "CVE-2012-0818"], "modified": "2013-01-24T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:resteasy", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:resteasy-manual", "p-cpe:/a:redhat:enterprise_linux:resteasy-examples", "p-cpe:/a:redhat:enterprise_linux:resteasy-javadoc", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2012-1059.NASL", "href": "https://www.tenable.com/plugins/nessus/64046", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1059. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64046);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-5245\", \"CVE-2012-0818\");\n script_bugtraq_id(51748);\n script_xref(name:\"RHSA\", value:\"2012:1059\");\n\n script_name(english:\"RHEL 5 / 6 : resteasy (RHSA-2012:1059)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated resteasy packages that fix one security issue are now\navailable for JBoss Enterprise Application Platform 5.1.2 for Red Hat\nEnterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nRESTEasy provides various frameworks to help you build RESTful web\nservices and RESTful Java applications.\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker submitted a request containing an\nexternal XML entity to a RESTEasy endpoint, the entity would be\nresolved, allowing the attacker to read files accessible to the user\nrunning the application server. This flaw affected DOM (Document\nObject Model) Document and JAXB (Java Architecture for XML Binding)\ninput. (CVE-2012-0818)\n\nNote: The fix for CVE-2012-0818 is not enabled by default. This update\nadds a new configuration option to disable entity expansion in\nRESTEasy. If applications on your server expose RESTEasy XML\nendpoints, a resteasy.document.expand.entity.references configuration\nsnippet must be added to their web.xml file to disable entity\nexpansion in RESTEasy. Refer to Red Hat Bugzilla bug 785631 for\ndetails.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform's 'jboss-as/server/[PROFILE]/deploy/' directory,\nalong with all other customized configuration files.\n\nUsers of JBoss Enterprise Application Platform 5.1.2 on Red Hat\nEnterprise Linux 4, 5, and 6 should upgrade to these updated packages,\nwhich correct this issue. The JBoss server process must be restarted\nfor this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=785631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1059\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-0818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-5245\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:resteasy-manual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1059\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"resteasy-1.2.1-10.CP02_patch01.1.ep5.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"resteasy-1.2.1-10.CP02_patch01.1.ep5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"resteasy-examples-1.2.1-10.CP02_patch01.1.ep5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"resteasy-javadoc-1.2.1-10.CP02_patch01.1.ep5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"resteasy-manual-1.2.1-10.CP02_patch01.1.ep5.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"resteasy / resteasy-examples / resteasy-javadoc / resteasy-manual\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T03:19:38", "description": "According to its self-reported version number, the remote Junos Space\nversion is prior to 13.3R1.8. It is, therefore, affected by multiple\nvulnerabilities in bundled third party software components :\n\n - Multiple vulnerabilities in RedHat JBoss application\n server. (CVE-2010-0738, CVE-2010-1428, CVE-2010-1429,\n CVE-2011-5245, CVE-2012-0818)\n\n - Multiple vulnerabilities in Oracle Java SE JDK.\n (CVE-2012-3143, CVE-2013-1537, CVE-2013-1557,\n CVE-2013-2422)\n\n - Multiple vulnerabilities in Oracle MySQL server.\n (CVE-2013-1502, CVE-2013-1511, CVE-2013-1532,\n CVE-2013-1544, CVE-2013-2375, CVE-2013-2376,\n CVE-2013-2389, CVE-2013-2391, CVE-2013-2392,\n CVE-2013-3783, CVE-2013-3793, CVE-2013-3794,\n CVE-2013-3801, CVE-2013-3802, CVE-2013-3804,\n CVE-2013-3805, CVE-2013-3808, CVE-2013-3809,\n CVE-2013-3812, CVE-2013-3839)\n\n - Multiple vulnerabilities in Apache HTTP Server.\n (CVE-2013-1862, CVE-2013-1896)\n\n - Known hard-coded MySQL credentials. (CVE-2014-3413)", "edition": 25, "published": "2014-12-22T00:00:00", "title": "Juniper Junos Space < 13.3R1.8 Multiple Vulnerabilities (JSA10627)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-3839", "CVE-2013-1532", "CVE-2013-2392", "CVE-2013-3809", "CVE-2010-1429", "CVE-2013-3783", "CVE-2013-1896", "CVE-2010-1428", "CVE-2013-1544", "CVE-2011-5245", "CVE-2013-1862", "CVE-2013-3808", "CVE-2013-1537", "CVE-2012-0818", "CVE-2013-2391", "CVE-2013-3794", "CVE-2013-1511", "CVE-2013-1502", "CVE-2013-3812", "CVE-2013-3805", "CVE-2013-2375", "CVE-2010-0738", "CVE-2014-3413", "CVE-2013-2389", "CVE-2013-3804", "CVE-2013-1557", "CVE-2013-2422", "CVE-2012-3143", "CVE-2013-3802", "CVE-2013-2376", "CVE-2013-3793", "CVE-2013-3801"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:juniper:junos_space"], "id": "JUNIPER_SPACE_JSA10627.NASL", "href": "https://www.tenable.com/plugins/nessus/80195", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(80195);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/07/12 19:01:16\");\n\n script_cve_id(\n \"CVE-2010-0738\",\n \"CVE-2010-1428\",\n \"CVE-2010-1429\",\n \"CVE-2011-5245\",\n \"CVE-2012-0818\",\n \"CVE-2012-3143\",\n \"CVE-2013-1502\",\n \"CVE-2013-1511\",\n \"CVE-2013-1532\",\n \"CVE-2013-1537\",\n \"CVE-2013-1544\",\n \"CVE-2013-1557\",\n \"CVE-2013-1862\",\n \"CVE-2013-1896\",\n \"CVE-2013-2375\",\n \"CVE-2013-2376\",\n \"CVE-2013-2389\",\n \"CVE-2013-2391\",\n \"CVE-2013-2392\",\n \"CVE-2013-2422\",\n \"CVE-2013-3783\",\n \"CVE-2013-3793\",\n \"CVE-2013-3794\",\n \"CVE-2013-3801\",\n \"CVE-2013-3802\",\n \"CVE-2013-3804\",\n \"CVE-2013-3805\",\n \"CVE-2013-3808\",\n \"CVE-2013-3809\",\n \"CVE-2013-3812\",\n \"CVE-2013-3839\",\n \"CVE-2014-3413\"\n );\n script_bugtraq_id(\n 39710,\n 51748,\n 51766,\n 56055,\n 59170,\n 59194,\n 59201,\n 59207,\n 59209,\n 59211,\n 59224,\n 59227,\n 59228,\n 59229,\n 59239,\n 59242,\n 59826,\n 61129,\n 61210,\n 61222,\n 61227,\n 61244,\n 61249,\n 61256,\n 61260,\n 61264,\n 61269,\n 61272,\n 63109\n );\n script_xref(name:\"TRA\", value:\"TRA-2014-01\");\n script_xref(name:\"EDB-ID\", value:\"17924\");\n script_xref(name:\"EDB-ID\", value:\"16274\");\n script_xref(name:\"EDB-ID\", value:\"16319\");\n script_xref(name:\"EDB-ID\", value:\"16316\");\n\n script_name(english:\"Juniper Junos Space < 13.3R1.8 Multiple Vulnerabilities (JSA10627)\");\n script_summary(english:\"Checks the version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the remote Junos Space\nversion is prior to 13.3R1.8. It is, therefore, affected by multiple\nvulnerabilities in bundled third party software components :\n\n - Multiple vulnerabilities in RedHat JBoss application\n server. (CVE-2010-0738, CVE-2010-1428, CVE-2010-1429,\n CVE-2011-5245, CVE-2012-0818)\n\n - Multiple vulnerabilities in Oracle Java SE JDK.\n (CVE-2012-3143, CVE-2013-1537, CVE-2013-1557,\n CVE-2013-2422)\n\n - Multiple vulnerabilities in Oracle MySQL server.\n (CVE-2013-1502, CVE-2013-1511, CVE-2013-1532,\n CVE-2013-1544, CVE-2013-2375, CVE-2013-2376,\n CVE-2013-2389, CVE-2013-2391, CVE-2013-2392,\n CVE-2013-3783, CVE-2013-3793, CVE-2013-3794,\n CVE-2013-3801, CVE-2013-3802, CVE-2013-3804,\n CVE-2013-3805, CVE-2013-3808, CVE-2013-3809,\n CVE-2013-3812, CVE-2013-3839)\n\n - Multiple vulnerabilities in Apache HTTP Server.\n (CVE-2013-1862, CVE-2013-1896)\n\n - Known hard-coded MySQL credentials. (CVE-2014-3413)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.tenable.com/security/research/tra-2014-01\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10627\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Junos Space 13.3R1.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploithub_sku\", value:\"EH-12-132\");\n script_set_attribute(attribute:\"exploit_framework_exploithub\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'JBoss JMX Console Deployer Upload and Execute');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/04/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:juniper:junos_space\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Junos Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Junos_Space/version\");\n\n exit(0);\n}\n\ninclude(\"junos.inc\");\ninclude(\"misc_func.inc\");\n\nver = get_kb_item_or_exit('Host/Junos_Space/version');\n\ncheck_junos_space(ver:ver, fix:'13.3R1.8', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3490"], "description": "RESTEasy contains a JBoss project that provides frameworks to help build RESTful Web Services and RESTful Java applications. It is a fully certified and portable implementation of the JAX-RS specification. ", "modified": "2015-04-24T22:47:08", "published": "2015-04-24T22:47:08", "id": "FEDORA:D75E16087AA0", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: resteasy-3.0.6-3.fc20", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3490"], "description": "[2.3.5-3]\n- Resolves: rhbz1121917 - CVE-2014-3490: XXE via parameter entities", "edition": 4, "modified": "2014-08-05T00:00:00", "published": "2014-08-05T00:00:00", "id": "ELSA-2014-1011", "href": "http://linux.oracle.com/errata/ELSA-2014-1011.html", "title": "resteasy-base security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oracle": [{"lastseen": "2019-05-29T18:21:14", "bulletinFamily": "software", "cvelist": ["CVE-2018-3170", "CVE-2018-3157", "CVE-2018-3138", "CVE-2018-3254", "CVE-2017-5533", "CVE-2018-3204", "CVE-2018-3141", "CVE-2017-7407", "CVE-2015-9251", "CVE-2016-8620", "CVE-2017-9798", "CVE-2016-8623", "CVE-2018-1000120", "CVE-2016-5244", "CVE-2018-0732", "CVE-2018-3183", "CVE-2015-0235", "CVE-2016-5420", "CVE-2018-3274", "CVE-2018-3271", "CVE-2018-1304", "CVE-2018-3297", "CVE-2018-3130", "CVE-2016-9840", "CVE-2018-3184", "CVE-2018-3227", "CVE-2018-3231", "CVE-2016-8615", "CVE-2016-8616", "CVE-2018-3188", "CVE-2018-3137", "CVE-2018-3174", "CVE-2018-3203", "CVE-2018-3154", "CVE-2016-5019", "CVE-2016-8619", "CVE-2015-3236", "CVE-2018-3189", "CVE-2018-1275", "CVE-2018-14048", "CVE-2018-3301", "CVE-2018-3294", "CVE-2018-3129", "CVE-2018-7489", "CVE-2018-3287", "CVE-2018-3180", "CVE-2018-3257", "CVE-2018-3280", "CVE-2018-3293", "CVE-2018-3247", "CVE-2018-3239", "CVE-2018-2911", "CVE-2018-3270", "CVE-2018-3249", "CVE-2018-3259", "CVE-2018-3167", "CVE-2018-3236", "CVE-2018-3292", "CVE-2017-3735", "CVE-2018-2912", "CVE-2018-3175", "CVE-2018-3250", "CVE-2014-0014", "CVE-2018-3299", "CVE-2018-1271", "CVE-2016-5080", "CVE-2018-3256", "CVE-2018-3136", "CVE-2018-3246", "CVE-2018-3152", "CVE-2016-8618", "CVE-2018-1000121", "CVE-2018-3285", "CVE-2018-3115", "CVE-2018-3263", "CVE-2018-11039", "CVE-2018-3282", "CVE-2018-3218", "CVE-2018-3150", "CVE-2018-3145", "CVE-2018-3132", "CVE-2018-3190", "CVE-2016-7141", "CVE-2018-3220", "CVE-2018-11307", "CVE-2018-3133", "CVE-2018-2889", "CVE-2018-3128", "CVE-2018-3214", "CVE-2018-3182", "CVE-2018-3211", "CVE-2018-3210", "CVE-2016-0729", "CVE-2018-3233", "CVE-2018-3209", "CVE-2018-3131", "CVE-2018-3302", "CVE-2016-0635", "CVE-2016-0755", "CVE-2016-2107", "CVE-2018-3267", "CVE-2018-3261", "CVE-2015-7501", "CVE-2018-3219", "CVE-2018-3291", "CVE-2018-3244", "CVE-2018-3265", "CVE-2018-3266", "CVE-2018-3193", "CVE-2018-3144", "CVE-2018-3206", "CVE-2018-3298", "CVE-2016-8617", "CVE-2016-9842", "CVE-2018-12022", "CVE-2018-3212", "CVE-2018-8014", "CVE-2016-1182", "CVE-2015-3153", "CVE-2018-1258", "CVE-2018-3234", "CVE-2018-3255", "CVE-2018-3226", "CVE-2018-1000122", "CVE-2018-3173", "CVE-2018-3215", "CVE-2018-3248", "CVE-2018-1305", "CVE-2018-3187", "CVE-2018-3276", "CVE-2018-3156", "CVE-2018-3241", "CVE-2018-3228", "CVE-2018-11776", "CVE-2018-3122", "CVE-2018-13785", "CVE-2018-3011", "CVE-2018-3139", "CVE-2017-7805", "CVE-2018-3223", "CVE-2018-3205", "CVE-2018-3230", "CVE-2018-1257", "CVE-2018-3213", "CVE-2017-5715", "CVE-2018-3161", "CVE-2018-3290", "CVE-2018-3201", "CVE-2018-1000300", "CVE-2018-3251", "CVE-2018-3225", "CVE-2018-2902", "CVE-2018-3163", "CVE-2015-3144", "CVE-2018-2887", "CVE-2014-0114", "CVE-2018-3179", "CVE-2018-3262", "CVE-2018-3237", "CVE-2018-0739", "CVE-2018-3222", "CVE-2018-3155", "CVE-2015-0252", "CVE-2018-3253", "CVE-2018-3126", "CVE-2018-8034", "CVE-2018-3127", "CVE-2018-3221", "CVE-2018-3059", "CVE-2015-3237", "CVE-2018-3279", "CVE-2018-3151", "CVE-2018-2909", "CVE-2018-3245", "CVE-2018-3252", "CVE-2018-3284", "CVE-2018-8013", "CVE-2018-3235", "CVE-2016-8622", "CVE-2018-3275", "CVE-2015-7990", "CVE-2018-3162", "CVE-2018-3197", "CVE-2018-1272", "CVE-2018-3278", "CVE-2018-3186", "CVE-2017-7525", "CVE-2018-3159", "CVE-2018-3171", "CVE-2018-3296", "CVE-2018-3194", "CVE-2018-3217", "CVE-2018-3273", "CVE-2018-3178", "CVE-2018-3147", "CVE-2018-3288", "CVE-2018-1270", "CVE-2014-7817", "CVE-2018-3191", "CVE-2018-18224", "CVE-2012-1007", "CVE-2018-3143", "CVE-2016-8624", "CVE-2018-0733", "CVE-2016-1181", "CVE-2018-3281", "CVE-2018-2971", "CVE-2016-3739", "CVE-2018-3146", "CVE-2016-9843", "CVE-2018-3277", "CVE-2018-3208", "CVE-2017-14735", "CVE-2015-3145", "CVE-2017-3738", "CVE-2018-3172", "CVE-2018-3164", "CVE-2018-3176", "CVE-2018-3169", "CVE-2018-3160", "CVE-2018-3149", "CVE-2014-3490", "CVE-2018-3185", "CVE-2018-3232", "CVE-2018-3264", "CVE-2018-8037", "CVE-2018-3258", "CVE-2017-5645", "CVE-2016-5421", "CVE-2016-9586", "CVE-2018-3272", "CVE-2018-3142", "CVE-2018-3295", "CVE-2018-2914", "CVE-2018-3192", "CVE-2018-3153", "CVE-2018-3283", "CVE-2017-5529", "CVE-2018-3269", "CVE-2016-9841", "CVE-2018-3196", "CVE-2016-4000", "CVE-2018-3289", "CVE-2018-3229", "CVE-2017-3736", "CVE-2018-3286", "CVE-2018-3177", "CVE-2018-3243", "CVE-2018-3242", "CVE-2018-3148", "CVE-2018-3181", "CVE-2018-18223", "CVE-2018-0737", "CVE-2018-3268", "CVE-2018-3200", "CVE-2016-5419", "CVE-2018-3195", "CVE-2017-15095", "CVE-2016-7167", "CVE-2018-11040", "CVE-2018-3198", "CVE-2018-3166", "CVE-2016-6814", "CVE-2018-3202", "CVE-2016-1000031", "CVE-2018-3158", "CVE-2018-1000301", "CVE-2018-3238", "CVE-2018-3134", "CVE-2018-12023", "CVE-2018-3224", "CVE-2018-3165", "CVE-2016-8621", "CVE-2018-3135", "CVE-2018-3168", "CVE-2015-6937", "CVE-2018-2922", "CVE-2018-3140", "CVE-2018-2913", "CVE-2018-3207"], "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:\n\n \n\n * [Critical Patch Updates, Security Alerts and Bulletins](<https://www.oracle.com/securityalerts>) for information about Oracle Security Advisories.\n\n \n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.**\n\nThis Critical Patch Update contains 301 new security fixes across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ October 2018 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2456979.1>).\n", "modified": "2018-10-16T00:00:00", "published": "2018-12-18T00:00:00", "id": "ORACLE:CPUOCT2018-4428296", "href": "", "type": "oracle", "title": "CPU Oct 2018", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-04T21:15:56", "bulletinFamily": "software", "cvelist": ["CVE-2012-1007", "CVE-2014-0014", "CVE-2014-0114", "CVE-2014-3490", "CVE-2014-7817", "CVE-2015-0235", "CVE-2015-0252", "CVE-2015-3144", "CVE-2015-3145", "CVE-2015-3153", "CVE-2015-3236", "CVE-2015-3237", "CVE-2015-6937", "CVE-2015-7501", "CVE-2015-7990", "CVE-2015-9251", "CVE-2016-0635", "CVE-2016-0729", "CVE-2016-0755", "CVE-2016-1000031", "CVE-2016-1181", "CVE-2016-1182", "CVE-2016-2107", "CVE-2016-3739", "CVE-2016-4000", "CVE-2016-5019", "CVE-2016-5080", "CVE-2016-5244", "CVE-2016-5419", "CVE-2016-5420", "CVE-2016-5421", "CVE-2016-6814", "CVE-2016-7141", "CVE-2016-7167", "CVE-2016-8615", "CVE-2016-8616", "CVE-2016-8617", "CVE-2016-8618", "CVE-2016-8619", "CVE-2016-8620", "CVE-2016-8621", "CVE-2016-8622", "CVE-2016-8623", "CVE-2016-8624", "CVE-2016-9586", "CVE-2016-9840", "CVE-2016-9841", "CVE-2016-9842", "CVE-2016-9843", "CVE-2017-14735", "CVE-2017-15095", "CVE-2017-3735", "CVE-2017-3736", "CVE-2017-3738", "CVE-2017-5529", "CVE-2017-5533", "CVE-2017-5645", "CVE-2017-5715", "CVE-2017-7407", "CVE-2017-7525", "CVE-2017-7805", "CVE-2017-9798", "CVE-2018-0732", "CVE-2018-0733", "CVE-2018-0737", "CVE-2018-0739", "CVE-2018-1000120", "CVE-2018-1000121", "CVE-2018-1000122", "CVE-2018-1000300", "CVE-2018-1000301", "CVE-2018-11039", "CVE-2018-11040", "CVE-2018-11307", "CVE-2018-11776", "CVE-2018-12022", "CVE-2018-12023", "CVE-2018-1257", "CVE-2018-1258", "CVE-2018-1270", "CVE-2018-1271", "CVE-2018-1272", "CVE-2018-1275", "CVE-2018-1304", "CVE-2018-1305", "CVE-2018-13785", "CVE-2018-14048", "CVE-2018-18223", "CVE-2018-18224", "CVE-2018-2887", "CVE-2018-2889", "CVE-2018-2902", "CVE-2018-2909", "CVE-2018-2911", "CVE-2018-2912", "CVE-2018-2913", "CVE-2018-2914", "CVE-2018-2922", "CVE-2018-2971", "CVE-2018-3011", "CVE-2018-3059", "CVE-2018-3115", "CVE-2018-3122", "CVE-2018-3126", "CVE-2018-3127", "CVE-2018-3128", "CVE-2018-3129", "CVE-2018-3130", "CVE-2018-3131", "CVE-2018-3132", "CVE-2018-3133", "CVE-2018-3134", "CVE-2018-3135", "CVE-2018-3136", "CVE-2018-3137", "CVE-2018-3138", "CVE-2018-3139", "CVE-2018-3140", "CVE-2018-3141", "CVE-2018-3142", "CVE-2018-3143", "CVE-2018-3144", "CVE-2018-3145", "CVE-2018-3146", "CVE-2018-3147", "CVE-2018-3148", "CVE-2018-3149", "CVE-2018-3150", "CVE-2018-3151", "CVE-2018-3152", "CVE-2018-3153", "CVE-2018-3154", "CVE-2018-3155", "CVE-2018-3156", "CVE-2018-3157", "CVE-2018-3158", "CVE-2018-3159", "CVE-2018-3160", "CVE-2018-3161", "CVE-2018-3162", "CVE-2018-3163", "CVE-2018-3164", "CVE-2018-3165", "CVE-2018-3166", "CVE-2018-3167", "CVE-2018-3168", "CVE-2018-3169", "CVE-2018-3170", "CVE-2018-3171", "CVE-2018-3172", "CVE-2018-3173", "CVE-2018-3174", "CVE-2018-3175", "CVE-2018-3176", "CVE-2018-3177", "CVE-2018-3178", "CVE-2018-3179", "CVE-2018-3180", "CVE-2018-3181", "CVE-2018-3182", "CVE-2018-3183", "CVE-2018-3184", "CVE-2018-3185", "CVE-2018-3186", "CVE-2018-3187", "CVE-2018-3188", "CVE-2018-3189", "CVE-2018-3190", "CVE-2018-3191", "CVE-2018-3192", "CVE-2018-3193", "CVE-2018-3194", "CVE-2018-3195", "CVE-2018-3196", "CVE-2018-3197", "CVE-2018-3198", "CVE-2018-3200", "CVE-2018-3201", "CVE-2018-3202", "CVE-2018-3203", "CVE-2018-3204", "CVE-2018-3205", "CVE-2018-3206", "CVE-2018-3207", "CVE-2018-3208", "CVE-2018-3209", "CVE-2018-3210", "CVE-2018-3211", "CVE-2018-3212", "CVE-2018-3213", "CVE-2018-3214", "CVE-2018-3215", "CVE-2018-3217", "CVE-2018-3218", "CVE-2018-3219", "CVE-2018-3220", "CVE-2018-3221", "CVE-2018-3222", "CVE-2018-3223", "CVE-2018-3224", "CVE-2018-3225", "CVE-2018-3226", "CVE-2018-3227", "CVE-2018-3228", "CVE-2018-3229", "CVE-2018-3230", "CVE-2018-3231", "CVE-2018-3232", "CVE-2018-3233", "CVE-2018-3234", "CVE-2018-3235", "CVE-2018-3236", "CVE-2018-3237", "CVE-2018-3238", "CVE-2018-3239", "CVE-2018-3241", "CVE-2018-3242", "CVE-2018-3243", "CVE-2018-3244", "CVE-2018-3245", "CVE-2018-3246", "CVE-2018-3247", "CVE-2018-3248", "CVE-2018-3249", "CVE-2018-3250", "CVE-2018-3251", "CVE-2018-3252", "CVE-2018-3253", "CVE-2018-3254", "CVE-2018-3255", "CVE-2018-3256", "CVE-2018-3257", "CVE-2018-3258", "CVE-2018-3259", "CVE-2018-3261", "CVE-2018-3262", "CVE-2018-3263", "CVE-2018-3264", "CVE-2018-3265", "CVE-2018-3266", "CVE-2018-3267", "CVE-2018-3268", "CVE-2018-3269", "CVE-2018-3270", "CVE-2018-3271", "CVE-2018-3272", "CVE-2018-3273", "CVE-2018-3274", "CVE-2018-3275", "CVE-2018-3276", "CVE-2018-3277", "CVE-2018-3278", "CVE-2018-3279", "CVE-2018-3280", "CVE-2018-3281", "CVE-2018-3282", "CVE-2018-3283", "CVE-2018-3284", "CVE-2018-3285", "CVE-2018-3286", "CVE-2018-3287", "CVE-2018-3288", "CVE-2018-3289", "CVE-2018-3290", "CVE-2018-3291", "CVE-2018-3292", "CVE-2018-3293", "CVE-2018-3294", "CVE-2018-3295", "CVE-2018-3296", "CVE-2018-3297", "CVE-2018-3298", "CVE-2018-3299", "CVE-2018-3301", "CVE-2018-3302", "CVE-2018-7489", "CVE-2018-8013", "CVE-2018-8014", "CVE-2018-8034", "CVE-2018-8037"], "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:\n\n * [Critical Patch Updates, Security Alerts and Bulletins](<https://www.oracle.com/securityalerts>) for information about Oracle Security Advisories.\n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.**\n\nThis Critical Patch Update contains 301 new security fixes across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ October 2018 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/epmos/faces/DocumentDisplay?id=2456979.1>).\n", "modified": "2018-10-16T00:00:00", "published": "2018-12-18T00:00:00", "id": "ORACLE:CPUOCT2018", "href": "", "type": "oracle", "title": "Oracle Critical Patch Update - October 2018", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}